Sciweavers

EDBT
2008
ACM
137views Database» more  EDBT 2008»
15 years 17 days ago
ACCOn: checking consistency of XML write-access control policies
XML access control policies involving updates may contain security flaws, here called inconsistencies, in which a forbidden operation may be simulated by performing a sequence of ...
Loreto Bravo, James Cheney, Irini Fundulaki
EDBT
2008
ACM
138views Database» more  EDBT 2008»
15 years 17 days ago
Mine your own business, mine others' news!
Major media companies such as The Financial Times, the Wall Street Journal or Reuters generate huge amounts of textual news data on a daily basis. Mining frequent patterns in this...
Boualem Benatallah, Guillaume Raschia, Noureddine ...
EDBT
2008
ACM
85views Database» more  EDBT 2008»
15 years 17 days ago
Optimizing on-demand data broadcast scheduling in pervasive environments
Data dissemination in pervasive environments is often accomplished by on-demand broadcasting. The time critical nature of the data requests plays an important role in scheduling t...
Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell ...
EDBT
2008
ACM
194views Database» more  EDBT 2008»
15 years 17 days ago
XCraft: boosting the performance of active XML materialization
An active XML (AXML) document contains tags representing calls to Web services. Therefore, retrieving its contents consists in materializing its data elements by invoking the embe...
Gabriela Ruberg, Marta Mattoso
EDBT
2008
ACM
158views Database» more  EDBT 2008»
15 years 17 days ago
Expressive query specification through form customization
A form-based query interface is usually the preferred means to provide an unsophisticated user access to a database. Not only is such an interface easy to use, requiring no techni...
Magesh Jayapandian, H. V. Jagadish
EDBT
2008
ACM
236views Database» more  EDBT 2008»
15 years 17 days ago
Virtualization and databases: state of the art and research challenges
ng the abstract view of computing resources from the implementation of these resources of indirection between abstract view and implementation of resources - Hides implementation d...
Ashraf Aboulnaga, Cristiana Amza, Kenneth Salem
EDBT
2008
ACM
150views Database» more  EDBT 2008»
15 years 17 days ago
Cost-based query optimization for complex pattern mining on multiple databases
For complex data mining queries, query optimization issues arise, similar to those for the traditional database queries. However, few works have applied the cost-based query optim...
Ruoming Jin, David Fuhry, Abdulkareem Alali
EDBT
2008
ACM
108views Database» more  EDBT 2008»
15 years 17 days ago
Revisiting redundancy and minimization in an XPath fragment
Redundancy and minimization of queries are investigated in a well known fragment of XPath that includes child and descendant edges, branches, wildcards, and multiple output nodes....
Benny Kimelfeld, Yehoshua Sagiv
EDBT
2008
ACM
180views Database» more  EDBT 2008»
15 years 17 days ago
Probabilistic ranked queries in uncertain databases
Recently, many new applications, such as sensor data monitoring and mobile device tracking, raise up the issue of uncertain data management. Compared to "certain" data, ...
Xiang Lian, Lei Chen 0002
EDBT
2008
ACM
103views Database» more  EDBT 2008»
15 years 17 days ago
A stratified approach to progressive approximate joins
Users often do not require a complete answer to their query but rather only a sample. They expect the sample to be either the largest possible or the most representative (or both)...
Wee Hyong Tok, Stéphane Bressan, Mong-Li Le...